Search

Download this Manual
PDF (US Ltr) - 43.2Mb
PDF (A4) - 43.3Mb
Man Pages (TGZ) - 295.2Kb
Man Pages (Zip) - 400.4Kb
Info (Gzip) - 4.3Mb
Info (Zip) - 4.3Mb


Displaying 1381 to 1390 of 1832 total results
https://dev.mysql.com/doc/refman/8.0/en/structured-system-variables.html
(You could also have written --default.key_buffer_size=256K.) In addition, the server creates a second key cache named extra_cache that has a size of 128KB, with the size of block buffers for caching table index blocks set to 2048 bytes. These rules ... A structured variable differs from a regular system variable in two respects: Its value is a structure with components that specify server parameters considered to be closely ...
https://dev.mysql.com/doc/refman/8.0/en/group-replication-responses-failure-expel.html
You can use the group_replication_member_expel_timeout system variable, which is available from MySQL 8.0.13, to allow additional time between the creation of a suspicion and the expulsion of the suspect member. A suspicion is created when one ...A ...
https://dev.mysql.com/doc/refman/8.0/en/log-file-maintenance.html
Note For the server to recreate a given log file after you have renamed the file externally, the file location must be writable by the server. As described in Section 7.4, “MySQL Server Logs”, MySQL Server can create several different log files ...However, you must clean up these files regularly to ensure that the logs do not take up too much disk ...
https://dev.mysql.com/doc/refman/8.0/en/replication-features-current-user.html
In some cases, such as statements that change passwords, the function reference is expanded before it is written to the binary log, so that the statement includes the user name. For all other cases, the name of the current user on the source is ...
https://dev.mysql.com/doc/refman/8.0/en/replication-howto.html
Optionally, create a separate user for your replicas to use during authentication with the source when reading the binary log for replication. Before creating a data snapshot or starting the replication process, on the source you should record the ... This section describes how to set up a MySQL server to use binary log file position based ...
https://dev.mysql.com/doc/refman/8.0/en/stored-routines-syntax.html
Stored routines are created with the CREATE PROCEDURE and CREATE FUNCTION statements (see Section 15.1.17, “CREATE PROCEDURE and CREATE FUNCTION Statements”). A stored routine is either a procedure or a function. A procedure is invoked using a ...
https://dev.mysql.com/doc/refman/8.0/en/audit-log.html
The log contents include when clients connect and disconnect, and what actions they perform while connected, such as which databases and tables they access. By default, MySQL Enterprise Audit uses tables in the mysql system database for persistent ... Note MySQL Enterprise Audit is an extension included in MySQL Enterprise Edition, a commercial ...
https://dev.mysql.com/doc/refman/8.0/en/automatic-start.html
The following table shows which option groups the server and startup scripts read from option files. Table 2.15 MySQL Startup Scripts and Supported Server Option Groups Script Option Groups mysqld [mysqld], [server], [mysqld-major_version] ... This ...
https://dev.mysql.com/doc/refman/8.0/en/changing-mysql-user.html
For example: [mysqld] user=user_name If your Unix machine itself is not secured, you should assign passwords to the MySQL root account in the grant tables. On Windows, you can run the server as a Windows service using a normal user account. On ...
https://dev.mysql.com/doc/refman/8.0/en/checking-gpg-signature.html
The signature file has the same name as the distribution file with an .asc extension, as shown by the examples in the following table. Another method of verifying the integrity and authenticity of a package is to use cryptographic signatures. This ...
Displaying 1381 to 1390 of 1832 total results